security

October 28, 2016

MANUFACTURING

Your industrial network doesn’t have to be a scary movie

Another Halloween is upon us, and jack o’lanterns, ghosts, and diabolical clowns are springing up everywhere. October is also National Cybersecurity Month—another reminder that the world can be a frightening place, with sophisticated new attacks on a regular basis.…

October 26, 2016

GOVERNMENT

Cybersecurity and the Federal Government – GovLoop’s Latest Guide Features Cisco

It seems like everyone is concerned about cybersecurity these days, but the stakes are especially high for the federal government. For good reason, as the public sector’s networks and data in question contain some of our nation’s most important and most sensitive information. But the technology land…

October 25, 2016

MANUFACTURING

The risk of doing nothing

Source: Edreformnow.org Have you ever told your team, “Upgrading our equipment is too expensive and likely to cause downtime. Let’s just keep it running.” Ultimately, you made a risk decision. While cyber security hasn’t been a critical risk factor until recently, it has quickly emerged as one of to…

October 21, 2016

PARTNER

Connections: Vulnerabilities? Or Advantages?

When is the last time that you didn’t update the operating system on your phone? Or ignored those pop-up messages letting you know your software is out of date? Last week I was in Arizona with about 50 partner executives, a speaker from Talos asked us the same question. A small number of people rais…

October 20, 2016

GOVERNMENT

Mission-Driven Cybersecurity

For many government agencies, cybersecurity can be an afterthought, a one-off, single product they add on after the fact to meet regulation or protect from basic hacks. What these agencies don’t realize is that cybersecurity isn’t an afterthought – it’s closely tied to an agency’s core mission. Whet…

October 19, 2016

EDUCATION

Join us at EDUCAUSE to Learn How to Constrain Cyber Attackers

Like Renee Patton who is Gearing up for EDUCAUSE 2016, I am equally thrilled to be co-presenting with Bruce Maas and Bob Turner from the University of Wisconsin – Madison. Our session, Effective Threat Detection: The Key to Constraining Our Attackers on Thursday October 27th from 8 to 8:50 am, will…

October 19, 2016

SP360: SERVICE PROVIDER

Upskill on Cybersecurity in a Virtual World

Submitted by Kelsey Kusterer Ziser, the Editor of Upskill U at Light Reading As service providers migrate traditional networks to virtualized networks, it’s no longer enough to only secure the perimeter. Threats from within the network are on the rise as hackers increasingly have access to mor…

October 18, 2016

SECURITY

Evolving Security Disclosures : The New OASIS Common Security Advisory Framework (CSAF) Technical Committee

During the last few years we have witnessed how the cyber security threat landscape has evolved. The emergence of the Internet of Things combined with recent events have profoundly changed how we protect our systems and people, and drive us to think about new approaches for vendors to disclose secur…

October 12, 2016

EXECUTIVE PLATFORM

How to Digitize: Create a Culture of Agility

In my previous blog, I discussed the most common question I receive, “How do I begin the digitization journey for my company?” The next question is often, “How do we change our corporate culture?” Corporate culture is key to the success or failure of digital business transformation. From my conversa…